followrulesbho.dll

Follow Rules

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module followrulesbho.dll by Follow Rules has been detected as adware by 40 anti-malware scanners. This file is typically installed with the program Follow Rules by Yontoo Technology, Inc. which is a potentially unwanted software program. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. The file has been seen being downloaded from install-cdn.followrulessoftware.com and multiple other hosts.
Publisher:
Follow Rules  (signed and verified)

Product:
Follow Rules

Version:
1.0.0.7

MD5:
616611ac4e22349fccadc1791b45a6e2

SHA-1:
cf41dc4f77d3810a68a50342f1b29677d11f773e

SHA-256:
ac8f7ae9c381687cef71ecce6dad17284cced414167abe524554c2ef8cd50e75

Scanner detections:
40 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
12/26/2024 4:05:14 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.CD
431

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.09.28

Avira AntiVirus
ADWARE/BrowseFox.Gen2
8.3.2.2

Arcabit
PUP.Adware.FollowRules.ega
1.0.0.567

avast!
MSIL:BrowseFox-S [PUP]
2014.9-151130

AVG
AdPlugin
2016.0.2909

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.151130

Bitdefender
Adware.BrowseFox.CD
1.0.20.1670

Bkav FE
W32.BrowseFoxAC.Adware
1.3.0.7237

Clam AntiVirus
Win.Adware.Browsefox-172
0.98/21511

Comodo Security
ApplicUnwnt
23315

Dr.Web
Trojan.Yontoo.1734
9.0.1.0334

Emsisoft Anti-Malware
Adware.BrowseFox.CD
8.15.11.30.08

ESET NOD32
Win32/BrowseFox.AE potentially unwanted (variant)
9.12320

Fortinet FortiGate
Riskware/BrowseFox
11/30/2015

F-Prot
W32/S-f64f6ec1
v6.4.7.1.166

F-Secure
Adware.BrowseFox.CD
11.2015-30-11_2

G Data
Adware.BrowseFox.CD
15.11.25

IKARUS anti.virus
AdWare.BrowseFox
t3scan.1.8.6.0

K7 AntiVirus
Trojan
13.210.17345

Kaspersky
not-a-virus:AdWare.Win32.Agent
14.0.0.1041

Malwarebytes
PUP.Optional.FollowRules
v2015.11.30.08

McAfee
Artemis!616611AC4E22
5600.6565

MicroWorld eScan
Adware.BrowseFox.CD
16.0.0.1002

NANO AntiVirus
Trojan.Win32.Yontoo.dnkubo
0.30.26.3725

Norman
Gen:Variant.Adware.BetterBrowse.1
11.20151130

nProtect
Adware.BrowseFox.CD
15.09.25.01

Panda Antivirus
Trj/CI.A
15.11.30.08

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Quick Heal
PUA.Followrule.Gen
11.15.14.00

Reason Heuristics
PUP.Yontoo.FollowRules (M)
15.11.30.20

Rising Antivirus
PE:Adware.BrowseFox!6.1D8B[F1]
23.00.65.151128

Sophos
Browse Fox (PUA)
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
9475

Trend Micro House Call
TROJ_GEN.F0C2C00LH14
7.2.334

Trend Micro
TROJ_GEN.R047C0OCI15
10.465.30

Vba32 AntiVirus
AdWare.MSIL.Agent
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
44118

Zillya! Antivirus
Adware.Agent.Win32.59171
2.0.0.2418

File size:
262.7 KB (269,040 bytes)

Product version:
1.0.0.7

Copyright:
(c) Follow Rules. All rights reserved.

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\follow rules\followrulesbho.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/10/2015 4:00:00 PM

Valid to:
1/11/2016 3:59:59 PM

Subject:
CN=Follow Rules, O=Follow Rules, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
360C16AC576B09F5DFA927EA0089856F

Registration
CLSID:
{f6d23555-8478-48e6-a7ff-03a2762bfee4}

COM registered:
Yes

File PE Metadata
Compilation timestamp:
2/22/2015 4:47:44 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:+miYckCqEbUViVqUsVNXBB+/DFK3wY+K19ZKT1h2fRcEX:+miYckOiiVMrXBdD9Z6E2U

Entry address:
0xF515

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, EA, 7E, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, D8, 21, 03, 10, E8, 4C, 02, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 4C, 77, 03, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, C4, 93, 02, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Entropy:
6.0740

Developed / compiled with:
Microsoft Visual C++

Code size:
159 KB (162,816 bytes)

The file followrulesbho.dll has been discovered within the following program.

Follow Rules  by Yontoo Technology, Inc.
Once this adware is installed the application integrates inside the browser through multiple means and will deliver ads including but not limited to banner ads, text-links, coupons and other offers both by injecting them in the user's web browser as well as displaying popups outside of the browser.
followrulessoftware.com/support
80% remove it
 
Powered by Should I Remove It?

The file followrulesbho.dll has been seen being distributed by the following 3 URLs.

http://install-cdn.followrulessoftware.com/bed?r=2015022322&bet=3

Remove followrulesbho.dll - Powered by Reason Core Security